Analysis

  • max time kernel
    150s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 02:23

General

  • Target

    7750a6188751772e496bf59536438a90_NeikiAnalytics.exe

  • Size

    205KB

  • MD5

    7750a6188751772e496bf59536438a90

  • SHA1

    ab6793c32ef433bcec94f639312796435aa4af43

  • SHA256

    6fb3302bc9adcabc6dc4332403c117ff71fd454614bbb4aca4b4d32ceb4d1580

  • SHA512

    1483460174752e2dd8cfdd560ebe044aa7c4346b1309ecfb4afdf077d0e25f4fcb6d854380e4c240576ff1ca9775e940fa839097f28b6d2ab257f6a29b51cfbd

  • SSDEEP

    3072:+nyiQSo1EZGtKgZGtK/PgtU1wAIuZAIuZwUhQ7XhxX:JiQSo1EZGtKgZGtK/CAIuZAIuZ8

Score
9/10

Malware Config

Signatures

  • Renames multiple (4673) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7750a6188751772e496bf59536438a90_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7750a6188751772e496bf59536438a90_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4488

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4018855536-2201274732-320770143-1000\desktop.ini.tmp
    Filesize

    205KB

    MD5

    c46cf15f399c67e082972fd3aabbeade

    SHA1

    c3aafa46de6f1c320576552623330473c4e0349a

    SHA256

    d1b0f8a8165383ea2cb4e3fd26eb23e3e9d08a75fc12faf279666016b65bda20

    SHA512

    80b410f983e6b0f6866ae26a68a7020b344b981a82c096f1041914b50c8c0a6e81c0c271b9cd48d1aa3074a7daf646bf5602f308c373851fdeda35c17ccc8d92

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    304KB

    MD5

    afae06ebc3556d6dee50b82112eeaf40

    SHA1

    1c4dc63075190272b8fa2aaf82ea80bc3f3e7b6a

    SHA256

    2abf568af4f650e079b9bb84a96276da8eccf365cede9b169963bb5fd82c914a

    SHA512

    ef71a8e29925c277ea1f6cfed8b61b63711cc4b0758b6c728146d9b6e0fb9d2017e62540e96c2c296c05d5c7ddcfe2add5a091b0e9e132cf8851e4bf22b28f83

  • memory/4488-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB